samiul008ghub / SIEM_SETUP_ELASTICLinks
☆16Updated 2 years ago
Alternatives and similar repositories for SIEM_SETUP_ELASTIC
Users that are interested in SIEM_SETUP_ELASTIC are comparing it to the libraries listed below
Sorting:
- SIEM Cheat Sheet☆77Updated 2 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆34Updated 9 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆50Updated last year
- ☆13Updated 3 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆111Updated last year
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆29Updated last year
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated 2 weeks ago
- Useful resources about phishing email analysis☆86Updated 11 months ago
- Knowledge base on cybercriminal concealment techniques☆93Updated 8 months ago
- ☆119Updated 7 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆45Updated 3 years ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆116Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Updated 9 months ago
- Incident Response with Threat Intelligence, published by Packt☆56Updated last year
- ☆34Updated 2 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Updated last year
- Elastic version of SOC prime watcher rules☆30Updated last year
- Repository resource for threat hunter☆158Updated 7 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆57Updated 10 months ago
- A runbook for handling security incidents in cooperation with 0xsyr0☆52Updated 3 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆126Updated last year
- ☆66Updated 4 years ago
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- Sniffing out well-known threat groups☆64Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆84Updated last year
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆136Updated last month
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆121Updated 7 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Updated 2 years ago